Addressing the Threat from Hypersonic...

Hypersonic weapons threaten to destabilize the worlds current balance of power. What is a hypersonic weapon? Which...

published on: Jul 15, 2018

Emerging Genomic Revolution in Securi...

The technology of genomics is just in its infancy and most of its contributions-to-date have been in medicine and...

published on: Jun 15, 2018

Big Brother is Alive and Well in Chin...

As growth has slowed, China has become obsessed with maintaining political and social stability.  For the first time...

published on: Jan 15, 2018

Policing in the Twenty-First Century

For millennia, law enforcement was carried out by human police, enforcing a peace between the members of villages,...

published on: Jan 16, 2017

Robots at War

published on: Sep 15, 2016

Ever since World War II, defense spending has provided an extraordinary boost to technologies like advanced materials, aerospace, and information...

The Biggest Unaddressed Threat to Our Securit...

published on: Mar 16, 2016

While growing income inequality, climate change, and repeats of the terrorists attacks we’ve experienced from radical Islam have all been called...

Computers Everywhere: What It Means for Our L...

published on: Jan 4, 2013

Thomas J. Watson, the founder of IBM, once said the worldwide demand for computers might total 10 machines.  Later, the head of the world's second...

The Ever-Changing Cyber-Security Threat

published on: Mar 8, 2012

Our careers, our fortunes, and our personal security all depend on the availability and reliability of information systems — and that dependency...

The Internet Grows More Dangerous

published on: Aug 5, 2011

Even as companies large and small work to stem the tide of cybercrime, the situation has gotten worse rather than better. Why is this the case? What...

Directed Energy Weapons Mature

published on: Jun 6, 2011

Directed energy weapons have been featured in science fiction for nearly a century, and they’ve been seriously pursued by researchers for at least...

Defending Your Reputation

published on: Jun 6, 2011

Throughout history, maintaining one’s “good name” has been crucial. Fortunately, until the 21st century, information traveled slowly and only...

Micro-Electromechanical Systems Become Mainst...

published on: Apr 6, 2011

The Trends editors have been tracking the evolution of MEMS technology for nearly two decades.  In that time, these tiny systems have become...

The West Begins to Address Chinese Industrial...

published on: Mar 15, 2011

As the Chinese economy becomes larger and more sophisticated, it has ratcheted up efforts to steal trade secrets from North American, Japanese, and...

Machines That Can See

published on: May 15, 2009

Since the earliest days of computing, researchers have dreamed of machines that could mimic seeing the world as people see it. In that case, they'd...

Cyber Warfare: The Growing Threat to Our Nati...

published on: Apr 15, 2009

Most professionals have a pretty good idea about the threat that cyber crime poses to their businesses and their lives. But, few of us appreciate the...

Artificial Life

published on: Mar 15, 2009

Right at the intersection of cutting-edge infotech, biotech, and nanotech is the unprecedented technology of artificial life. This new industry will...

Growing Geopolitical Uncertainty, the "Wild C...

published on: Mar 15, 2009

Of all the risks that businesses, investors, and individuals face in the coming decade, none is more difficult to assess and prepare for than...

The "Lab on a Chip" Revolution

published on: Aug 15, 2008

Micro-electronics is merging with a new technology called micro-fluidics to make possible the construction of entire chemical laboratories that can...

Robotic Suits Amplify Human Capabilities

published on: Jul 15, 2008

While robots are tough, strong and tireless, they lack some of the crucial capabilities possessed by humans. What if robot technology could be used...

The Sky Is the Limit for Unmanned Aerial Vehi...

published on: Mar 15, 2008

Unmanned aerial vehicles are important weapons in the war in Iraq and in the fight against terrorism, but their applications are not limited to...

« Previous Entries